Advanced Cybersecurity Training

Make It Your Own

We’ve created training courses that use a student’s base skills and allows them to work at their pace to become an expert in the field. The training environment is set up in a way that the student can balance their business workload with the time needed to accomplish goals of the class. All courses are hands on and mostly self-guided sessions. Most importantly each training course is fully customizable to the client’s needs and experience.

It is learning through experiences!

Expert Guides

Industry experts with over two decades of experience and a variety of skills lay out a plan at the start of the course. These experts are available throughout the course to help students find the answers to their questions.

After the first two days of the course, the experts are available up to 4 hours a week for one on one student questions. Weekly status and progress reviews will be scheduled around the student’s work priorities.

Every student gets full access 24/7 to all hardware resources and support personnel.

Hands On

At the start of the course students are given an overall view and plan for the course along with any and all resources and documentation needed to complete the course. Following this the student is then sent on a journey of discovery and learning through hands on experiences.

Each student is expected to come up with creative solutions to solve problems and be resourceful to accomplish the tasks they face. True learning happens not when told how to do something but when you have to determine the steps you have to take to solve a problem and then perform them.

There are no text books or scripts to follow just creating experiences. Upon completion of one of the training courses a student will have learned what they need to know but will also know how to find what they don’t.

We learn more by looking for the answer to a question and not finding it than we do from learning the answer itself.

Lloyd Alexander

Courses Offered



NetIQ Identity & Access Management



Oracle Identity Management



IT Security

Audience

Resources Provided

The target audience for these courses are:

Architects

Technical Consultants

Technical Administrators

Security Administrators

Up to 15 virtual machines

Links to an internal knowledgebase and documentations

Access to a dedicated expert, 4 hours per week

24/7 access to hardware resources

24/7 access to consultants and support personnel

Pricing

Course

Description

Duration

Price

NetIQ Identity & Access Management

Understand and implement event and standards based provisioning and SSO solutions.

5-10 weeks

Customized based off client's need.

Oracle Identity Management

Tackle the complexity of an OIM system by leaning to build it from scratch.

5-10 weeks

Customized based off client's need.

IT Security

Learn the full breadth of IT security. Covering everything from security models, networks, operating systems, cryptography through domain applications.